Bethany Allen-Ebrahimian is the China reporter at Axios. Before joining Axios, Bethany served as the lead reporter for the International Consortium of Investigative Journalists' China Cables project, a major leak of classified Chinese government documents revealing the inner workings of mass internment camps in Xinjiang. Previously, Bethany was an editor and contributing reporter at Foreign Policy magazine and a national security reporter at The Daily Beast. Bethany spent four years in China. She is now based in Washington, DC.
Andrew Morris
Founder & CEO, GreyNoise
Andrew Morris is founder and CEO of GreyNoise Intelligence, a cyber security company based in Washington DC that analyzes Internet scanning traffic to separate threats from background noise. Andrew has a strong background in offensive cyber operations and security research. Before starting GreyNoise, Andrew worked in R&D at Endgame (military grade endpoint protection), security engineering at Intrepidus Group (mobile app security), and penetration testing at Knowledge Consulting Group.
Brad Spengler
President, Open Source Security, Inc
Brad Spengler has been involved in Linux security for over two decades. As an author of grsecurity, he's been at the forefront of defensive security measures that have had an impact on Linux and the wider OS ecosystem. As president of Open Source Security, Inc. since 2008, he and his team continue to push the state of the art in OS security. In another life, Mr. Spengler worked extensively for 15 years in the spaces of Windows malware analysis, reverse engineering, deobfuscation, and sandbox/kernel development.
Rob Lefferts
CVP for M365 Security Team, Microsoft
Rob Lefferts is Corporate Vice President for M365 Security Team within the Security, Compliance, Identity and Management Division of Microsoft. He leads the team responsible for the commercial experience and the end-to-end security of Microsoft 365 ensuring that Microsoft 365 provides a comprehensive and cohesive security experience, products, and technology for all our customers. Lefferts holds a BS and MS from Carnegie Mellon in Pittsburgh, PA.
Diane Dubois
Security Engineer, Google
After starting her career as a developer in the PowerShell team at Microsoft, Diane transferred to the security field, first as a developer and then as a reverse engineer. She currently works as a Security Engineer at Google Zurich on Google Cloud security. Her focus areas are operating systems, virtualization, and firmware analyzed on a day to day basis through security reviews and vulnerability research.
She is also an active member of women associations in security such as BlackHoodie.
Adam Morrison
Associate Professor
Adam Morrison is an associate professor at the Blavatnik School of Computer Science, Tel Aviv University, Israel. His research is on the security and performance of shared-memory multiprocessors, from microarchitecture through operating systems to algorithms. His work has been awarded the 2021 Internet Defense Prize (first place), the 2021 Intel Hardware Security Academic Award, several best paper awards (at the USENIX Security symposium, ASPLOS, and MICRO), as well as IEEE Micro Top Picks and Top Picks Honorable Mention distinctions.
Gil Dabah
Co-founder & CEO, Piiano
Gil loves software engineering, security, and snowboarding. He has done many hardcore software research projects and various management roles throughout his career. GIl is the developer behind the diStorm disassembler library, and also published many 0d's over the years. His previous cybersecurity company, NorthBit, was acquired by MagicLeap in 2016 and he became the product security lead. These days, Gil is the co-founder and CEO of Piiano, a privacy and security infrastructure for developers to safeguard customers' sensitive information.
Saar Amar
Security Researcher, Microsoft
Saar Amar is an expert security researcher in MSRC and is proficient in vulnerability research and exploitation. He is highly experienced in reverse engineering, low-level/internals, and cloud security. He found and reliably exploited major vulnerabilities in different operating systems, hypervisors, and browsers. He is currently focusing on mitigations research. He speaks at international cybersecurity conferences around the world, and regularly publishes original research and findings.
Antonio Cocomazzi
Threat Researcher, SentinelOne
Antonio Cocomazzi is a Threat Intelligence Researcher at SentinelOne with a particular interest in malware analysis and windows internals.
He also conducts independent research with a focus on discovering new vulnerabilities and, more generally, in digging into Windows operating systems.
He enjoys reversing any kind of binaries from packed malwares to windows internal components.
He likes playing online CTF and writing/publishing offensive tools and security research on his GitHub channel, mostly based on Windows OS.
He presented previously at international conferences such as Black Hat, Hack In The Box and RomHack.
Andrea Pierini
Security Manager & Researcher
Andrea Pierini is an IT Architect – Security Manager and independent Security Researcher with long-term experience and in-depth knowledge covering all aspects of IT: from SW development to systems administration, networking administration and IT security. He defines himself as an “IT Security enthusiast” interested in all emerging technologies in offensive and defensive security and bug hunting. He also likes writing and speaking about IT security, and has given talks at various national and international conferences and published several CVE’s. He was rewarded in 2020 by Microsoft in the Top 100 Most Valuable MSRC Security Researchers Program.
Stav Shulman
Senior Researcher, Mandiant
Stav Shulman is a senior researcher and analyst for Mandiant Threat Intelligence with significant expertise in reverse engineering and long-term tracking and hunting of state sponsored actors. Stav started her career in Incident Response and analysis of mobile malware with focus on Android operating system. In the last few years, she had been tracking different malware families and threat actors operating against Middle Eastern targets, as well as operations performed by Middle Eastern threat actors.
Sharon Brizinov
Vulnerability Research Team Lead, Claroty
Sharon Brizinov is the vulnerability research team lead at Claroty. He specializes in vulnerability research, malware analysis, network forensics, and ICS/SCADA security. In addition, Brizinov participated in well-known hacking competitions such as Pwn2Own, and he holds a DEFCON black-badge for winning the ICS CTF.
Samuel Groß
Software Engineer, Google
Samuel is a Software Engineer currently working at Google Project Zero where he focuses on Web Browser security and 0-click attacks. Prior to that, he worked as an independent security researcher, during which he successfully participated in pwn2own and published two Phrack articles.
Ian Beer
Software Engineer, Google
Ian is a Software Engineer at Google, where he joined the Chrome security team in 2013 and since 2014 has been working with Google Project Zero focusing on remote and local attacks on Apple platforms.
Niv Yehezkel
Security Expert
Niv is a security expert and a vulnerability researcher with more than a decade of professional experience in the field. Today, Niv is working on his own web3 security startup, and is an active member of the Pasten CTF team.
Tal Be'ery
Co-founder & CTO, ZenGo
Tal Be'ery is Co-Founder and CTO of ZenGo, securing crypto assets with the ZenGo Wallet mobile app. Tal is a cyber-security researcher, returning speaker in the industry's most prestigious events, including Black Hat and RSA Conference, and a member of Facebook's exclusive WhiteHat list. One of his most known works was the TIME attack against the HTTPS/SSL protocol. For the last two decades, Tal had built and led a few Cyber-Security R&D teams, mostly in the field of network monitoring for various security problems and protocols. Previously, Tal led research for Aorato (acquired by Microsoft) as VP for Research. Tal holds M.Sc. and B.Sc degrees in CS/EE from Tel-Aviv University and a CISSP certification.
Shalev Keren
Cryptography Researcher, ZenGO
Shalev Keren is a Cryptography Researcher at ZenGo, working mainly on MPC protocols for multi-party signature schemes. Shalev also works on Web3 security at ZenGo. Previously, Shalev was in the IDF working on Vulnerability Research. Shalev’s B.Sc was in Mathematics, and he also does some Graduate work on MPC.
Jonathan Bar Or (JBO)
Principal Security Researcher, Microsoft
Jonathan Bar Or ("JBO") is a Principal Security Researcher at Microsoft, working as the Microsoft Defender research architect for cross-platform. Jonathan has rich experience in vulnerability research, exploitation, cryptoanalysis, and offensive security in general.
Tzah Pahima
Cloud Security Researcher, Orca Security
Tzah Pahima is a cloud security researcher at Orca Security. He specializes in
vulnerability research and web security. Before joining Orca, Tzah served for five years
in an Israeli military intelligence unit.
Yuri Rozhansky
Research Manager, Mandiant
Yuri is a Research Manager working for Mandiant with significant expertise in reverse engineering. Yuri holds a bachelor’s degree in Computer Engineering from the Technion Institute of Technology in Israel where he conducted research and published a paper about GPU security. He is an experienced malware analyst who reverse engineered complex malware across several different OS platforms. Yuri joined Mandiant in 2018 as a researcher to hunt and analyze nation-state sponsored threats, with a focus on Middle Eastern actors.